Home
last modified time | relevance | path

Searched full:update (Results 1 – 25 of 60) sorted by relevance

123

/mcuboot-3.4.0/ci/fih_test_docker/
Dutils.py45 test_stats.update([CATEGORIES['TOTAL']])
48 test_stats.update([CATEGORIES['SUCCESS']])
52 test_stats.update([CATEGORIES['ADDRES_NOEXEC']])
56 test_stats.update([CATEGORIES['BOOT']])
59 failed_boot_last_lines.update([test["last_line"]])
61 exec_fail_reasons.update([test["test_exec_fail_reason"]])
/mcuboot-3.4.0/ext/tinycrypt/lib/source/
Dhmac_prng.c78 static void update(TCHmacPrng_t prng, const uint8_t *e, unsigned int len) in update() function
128 /* update assumes SOME key has been configured into HMAC */ in tc_hmac_prng_init()
130 update(prng, personalization, plen); in tc_hmac_prng_init()
162 /* call update for the seed and additional_input */ in tc_hmac_prng_reseed()
163 update(prng, seed, seedlen); in tc_hmac_prng_reseed()
164 update(prng, additional_input, additionallen); in tc_hmac_prng_reseed()
167 /* call update only for the seed */ in tc_hmac_prng_reseed()
168 update(prng, seed, seedlen); in tc_hmac_prng_reseed()
209 update(prng, prng->v, TC_SHA256_DIGEST_SIZE); in tc_hmac_prng_generate()
Dctr_mode.c80 /* update the output */ in tc_ctr_mode()
86 /* update the counter */ in tc_ctr_mode()
/mcuboot-3.4.0/boot/bootutil/include/bootutil/
Dboot_hooks.h87 /** Hook for implement image update
89 * This hook is for for implementing an alternative mechanism of image update or
96 * @retval 0: update was done, skip performing the update
117 * Update will be undone so might be resume on the next boot.
/mcuboot-3.4.0/docs/
Dreadme-nuttx.md25update agent, which is an important component of a secure firmware update subsystem. Through MCUbo…
27 …rmware image from a webserver, installing it and triggering the firmware update process for the ne…
Dreadme-espressif.md26 2. Update the submodules needed by the Espressif port. This may take a while.
28 git submodule update --init --recursive --checkout boot/espressif/hal/esp-idf
33 git submodule update --init --recursive ext/mbedtls
144 …verify and compare the new image version number with the current one before perform an update swap.
150 …om version number. This allows image downgrade at some extent, since any update must have greater …
156 E.g.: if the current image was signed using `-s 1` parameter, an eventual update image must have be…
360 *When on **RELEASE MODE**, **ENSURE** that the application with an update agent is flashed before r…
462 …e.g. if pre-encrypted data is sent for an OTA update, it would be wrongly double-encrypted when th…
489 …*, therefore the bootloader is aware of the second image regions and can update it, however it doe…
501 # Notice that the OS layer and update agent must be aware
[all …]
Dreadme-mbed.md39 …firmed()` after an update, or set a new image in the secondary slot as pending with `boot_set_pend…
DGemfile13 # uncomment the line below. To upgrade, run `bundle update github-pages`.
Dreadme-mynewt.md21 Then update your app's `pkg.yml` adding the extra dependency:
Drelease-notes.md211 image update strategy is used)
235 - Update imgtool.py to support the new features
260 should land in 1.4.0. This includes a simulator update for testing
386 future release of MCUboot will update the Tinycrypt version.
/mcuboot-3.4.0/boot/zephyr/
DKconfig.serial_recovery17 If y, enables a serial-port based update mode. This allows
18 MCUboot itself to load update images into flash over a UART.
53 respect the "image" field in mcumgr image update frame
/mcuboot-3.4.0/boot/boot_serial/src/
Dboot_serial_priv.h82 * parameter of the mcumgr update frame.
85 * mcumgr update frame to be translated.
/mcuboot-3.4.0/scripts/imgtool/keys/
Ded25519_test.py86 sha.update(buf)
96 sha.update(b'This is thE message')
/mcuboot-3.4.0/scripts/imgtool/
Dimage.py303 cipherkey = encryptor.update(plainkey) + encryptor.finalize()
306 mac.update(cipherkey)
336 sha.update(pub)
343 sha.update(pub)
454 sha.update(self.payload)
529 encryptor.update(img) + encryptor.finalize()
654 sha.update(b[:prot_tlv_size])
/mcuboot-3.4.0/boot/cypress/BlinkyApp/
Dmain.c70 #define WATCHDOG_UPD_MESSAGE "[BlinkyApp] Update watchdog timer started in MCUBootApp to mark succ…
121 /* Update watchdog timer to mark successful start up of application */ in main()
/mcuboot-3.4.0/boot/bootutil/include/bootutil/crypto/
Dcommon.h10 /* TODO May need to update this in a future 3.x version of Mbed TLS.
/mcuboot-3.4.0/boot/espressif/port/esp32/
Dbootloader-multi.conf9 # Notice that the OS layer and update agent must be aware
/mcuboot-3.4.0/boot/zephyr/include/
Dmcuboot-mbedtls-cfg.h20 * If you put any "generic" definitions in here, make sure to update
/mcuboot-3.4.0/boot/espressif/port/esp32s3/
Dbootloader-multi.conf10 # Notice that the OS layer and update agent must be aware
/mcuboot-3.4.0/boot/mbed/include/flash_map_backend/
Dsecondary_bd.h31 * @retval secondary_bd Secondary BlockDevice where update candidates are stored
/mcuboot-3.4.0/boot/mbed/
Dmbed_lib.json61 …r code path, which only supports overwriting the existing image with the update image, is also ava…
180 "help": "Enable ability to boot update candidates in-place.",
/mcuboot-3.4.0/ci/fih_test_docker/docker-build/
DDockerfile18 RUN apt-get update && \
/mcuboot-3.4.0/boot/cypress/platforms/
Dcycfg_system.c244 /* Set worst case memory wait states (! ultra low power, 150 MHz), will update at the end */ in init_cycfg_system()
250 #warning Power system will not be configured. Update power personality to v1.20 or later. in init_cycfg_system()
523 /* Update System Core Clock values for correct Cy_SysLib_Delay functioning */ in init_cycfg_system()
/mcuboot-3.4.0/sim/
DREADME.rst25 $ git submodule update --init --recursive
/mcuboot-3.4.0/boot/bootutil/src/
Dloader.c300 /* Figure out what size to write update status update as. The size depends in boot_write_sz()
848 * counter to update.
1199 /* Update the stored security counter with the new image's security counter in boot_copy_image()
1207 BOOT_LOG_ERR("Security counter update failed after image upgrade."); in boot_copy_image()
1501 * TLV area are all satisfied and update the related swap type if necessary.
1542 * Performs a clean (not aborted) image update.
1560 /* Check if the image update was triggered by a bad image in the in boot_perform_update()
1592 /* Update the stored security counter with the new image's security in boot_perform_update()
1606 BOOT_LOG_ERR("Security counter update failed after " in boot_perform_update()
1912 /* Update the stored security counter with the active image's security
[all …]

123